FacebookTwitterGoogle+RedditEmail

As the Surveillance Expands, Best Way to Resist is to Bury the NSA in Garbage

by

Word that Yahoo! last year, at the urging of the National Security Agency, secretly developed a program that monitored the mail of all 280 million of its customers and turned over to the NSA all mail from those who used any of the agency’s thousands of keywords, shows that the US has become a total police state in terms of trying to monitor every person in the country (and outside too).

With the courts, especially at the appellate and Supreme Court level, rolling over and supporting this massive evisceration of basic freedoms, including the First Amendment guarantee of freedom of speech and the Fourth Amendment protection against illegal search and seizure and invasion of privacy, perhaps the best way for us to fight back is to overload the spy system. How to do this? Just copy and paste random fragments of the following list (a bit dated, but useable), provided courtesy of the publication Business Insider, and include them in every communication — email, social media, etc. — that you send out.

The secret Yahoo! assault (reported on here by Alfredo Lopez in yesterday’s article), works by searching users’ emails for keywords on an NSA list of suspected words that might be used by alleged terrorists or anti-government activists, and then those suspect communications are forwarded to the NSA, where humans eventually have to separate the wheat from the chaff. Too much chaff (and they surely have too much chaff anyhow!) and they will be buried with work and unable to read anything.

In fact, critics of the government’s metastasizing universal surveillance program, including former FBI agents and other experts, have long criticized the effort to turn the US into a replica of East Germany with its Stazi secret police, cannot work and is actually counter-productive, because with spy agencies’ limited manpower looking at all the false leads provided by keyword monitoring, they are bound to miss the real dangerous messages. In fact, this was also the argument used against the FBI’s program of monitoring mosques and suspecting every Muslim American who expressed criticism of the US. Most are just people saying what a lot of us say: that the US wars in the Middle East are wrong or even criminal, but they are just citizens or immigrants exercising their free speech when they do this, not terrorists, and spying on them is and has been a huge waste or time and resources.

So, to help destroy the continuing and expanding effort to monitor everything we do, here’s a sample of the NSA’s keyword list:

Waihopai, INFOSEC, Information Security, Information Warfare, IW, IS, Priavacy, Information Terrorism, Terrorism Defensive Information, Defense Information Warfare, Offensive Information, Offensive Information Warfare, National Information Infrastructure, InfoSec, Reno, Compsec, Computer Terrorism, Firewalls, Secure Internet Connections, ISS, Passwords, DefCon V, Hackers, Encryption, Espionage, USDOJ, NSA, CIA, S/Key, SSL, FBI, Secert Service, USSS, Defcon, Military, White House, Undercover, NCCS, Mayfly, PGP, PEM, RSA, Perl-RSA, MSNBC, bet, AOL, AOL TOS, CIS, CBOT, AIMSX, STARLAN, 3B2, BITNET, COSMOS, DATTA, E911, FCIC, HTCIA, IACIS, UT/RUS, JANET, JICC, ReMOB, LEETAC, UTU, VNET, BRLO, BZ, CANSLO, CBNRC, CIDA, JAVA, Active X, Compsec 97, LLC, DERA, Mavricks, Meta-hackers, ^?, Steve Case, Tools, Telex, Military Intelligence, Scully, Flame, Infowar, Bubba, Freeh, Archives, Sundevil, jack, Investigation, ISACA, NCSA, spook words, Verisign, Secure, ASIO, Lebed, ICE, NRO, Lexis-Nexis, NSCT, SCIF, FLiR, Lacrosse, Flashbangs, HRT, DIA, USCOI, CID, BOP, FINCEN, FLETC, NIJ, ACC, AFSPC, BMDO, NAVWAN, NRL, RL, NAVWCWPNS, NSWC, USAFA, AHPCRC, ARPA, LABLINK, USACIL, USCG, NRC, ~, CDC, DOE, FMS, HPCC, NTIS, SEL, USCODE, CISE, SIRC, CIM, ISN, DJC, SGC, UNCPCJ, CFC, DREO, CDA, DRA, SHAPE, SACLANT, BECCA, DCJFTF, HALO, HAHO, FKS, 868, GCHQ, DITSA, SORT, AMEMB, NSG, HIC, EDI, SAS, SBS, UDT, GOE, DOE, GEO, Masuda, Forte, AT, GIGN, Exon Shell, CQB, CONUS, CTU, RCMP, GRU, SASR, GSG-9, 22nd SAS, GEOS, EADA, BBE, STEP, Echelon, Dictionary, MD2, MD4, MDA, MYK, 747,777, 767, MI5, 737, MI6, 757, Kh-11, Shayet-13, SADMS, Spetznaz, Recce, 707, CIO, NOCS, Halcon, Duress, RAID, Psyops, grom, D-11, SERT, VIP, ARC, S.E.T. Team, MP5k, DREC, DEVGRP, DF, DSD, FDM, GRU, LRTS, SIGDEV, NACSI, PSAC, PTT, RFI, SIGDASYS, TDM. SUKLO, SUSLO, TELINT, TEXTA. ELF, LF, MF, VHF, UHF, SHF, SASP, WANK, Colonel, domestic disruption, smuggle, 15kg, nitrate, Pretoria, M-14, enigma, Bletchley Park, Clandestine, nkvd, argus, afsatcom, CQB, NVD, Counter Terrorism Security, Rapid Reaction, Corporate Security, Police, sniper, PPS, ASIS, ASLET, TSCM, Security Consulting, High Security, Security Evaluation, Electronic Surveillance, MI-17, Counterterrorism, spies, eavesdropping, debugging, interception, COCOT, rhost, rhosts, SETA, Amherst, Broadside, Capricorn, Gamma, Gorizont, Guppy, Ionosphere, Mole, Keyhole, Kilderkin, Artichoke, Badger, Cornflower, Daisy, Egret, Iris, Hollyhock, Jasmine, Juile, Vinnell, B.D.M.,Sphinx, Stephanie, Reflection, Spoke, Talent, Trump, FX, FXR, IMF, POCSAG, Covert Video, Intiso, r00t, lock picking, Beyond Hope, csystems, passwd, 2600 Magazine, Competitor, EO, Chan, Alouette,executive, Event Security, Mace, Cap-Stun, stakeout, ninja, ASIS, ISA, EOD, Oscor, Merlin, NTT, SL-1, Rolm, TIE, Tie-fighter, PBX, SLI, NTT, MSCJ, MIT, 69, RIT, Time, MSEE, Cable & Wireless, CSE, Embassy, ETA, Porno, Fax, finks, Fax encryption, white noise, pink noise, CRA, M.P.R.I., top secret, Mossberg, 50BMG, Macintosh Security, Macintosh Internet Security, Macintosh Firewalls, Unix Security, VIP Protection, SIG, sweep, Medco, TRD, TDR, sweeping, TELINT, Audiotel, Harvard, 1080H, SWS, Asset, Satellite imagery, force, Cypherpunks, Coderpunks, TRW, remailers, replay, redheads, RX-7, explicit, FLAME, Pornstars, AVN, Playboy, Anonymous, Sex, chaining, codes, Nuclear, 20, subversives, SLIP, toad, fish, data havens, unix, c, a, b, d, the, Elvis, quiche, DES, 1*, NATIA, NATOA, sneakers, counterintelligence, industrial espionage, PI, TSCI, industrial intelligence, H.N.P., Juiliett Class Submarine, Locks, loch, Ingram Mac-10, sigvoice, ssa, E.O.D., SEMTEX, penrep, racal, OTP, OSS, Blowpipe, CCS, GSA, Kilo Class, squib, primacord, RSP, Becker, Nerd, fangs, Austin, Comirex, GPMG, Speakeasy, humint, GEODSS, SORO, M5, ANC, zone, SBI, DSS, S.A.I.C., Minox, Keyhole, SAR, Rand Corporation, Wackenhutt, EO, Wackendude, mol, Hillal, GGL, CTU, botux, Virii, CCC, Blacklisted 411, Internet Underground, XS4ALL, Retinal Fetish, Fetish, Yobie, CTP, CATO, Phon-e, Chicago Posse, l0ck, spook keywords, PLA, TDYC, W3, CUD, CdC, Weekly World News, Zen, World Domination, Dead, GRU, M72750, Salsa, 7, Blowfish, Gorelick, Glock, Ft. Meade, press-release, Indigo, wire transfer, e-cash, Bubba the Love Sponge, Digicash, zip, SWAT, Ortega, PPP, crypto-anarchy, AT&T, SGI, SUN, MCI, Blacknet, Middleman, KLM, Blackbird, plutonium, Texas, jihad, SDI, Uzi, Fort Meade, supercomputer, bullion, 3, Blackmednet, Propaganda, ABC, Satellite phones, Planet-1, cryptanalysis, nuclear, FBI, Panama, fissionable, Sears Tower, NORAD, Delta Force, SEAL, virtual, Dolch, secure shell, screws, Black-Ops, Area51, SABC, basement, data-haven, black-bag, TEMPSET, Goodwin, rebels, ID, MD5, IDEA, garbage, market, beef, Stego, unclassified, utopia, orthodox, Alica, SHA, Global, gorilla, Bob, Pseudonyms, MITM, Gray Data, VLSI, mega, Leitrim, Yakima, Sugar Grove, Cowboy, Gist, 8182, Gatt, Platform, 1911, Geraldton, UKUSA, veggie, 3848, Morwenstow, Consul, Oratory, Pine Gap, Menwith, Mantis, DSD, BVD, 1984, Flintlock, cybercash, government, hate, speedbump, illuminati, president, freedom, cocaine, $, Roswell, ESN, COS, E.T., credit card, b9, fraud, assasinate, virus, anarchy, rogue, mailbomb, 888, Chelsea, 1997, Whitewater, MOD, York, plutonium, William Gates, clone, BATF, SGDN, Nike, Atlas, Delta, TWA, Kiwi, PGP 2.6.2., PGP 5.0i, PGP 5.1, siliconpimp, Lynch, 414, Face, Pixar, IRIDF, eternity server, Skytel, Yukon, Templeton, LUK, Cohiba, Soros, Standford, niche, 51, H&K, USP, ^, sardine, bank, EUB, USP, PCS, NRO, Red Cell, Glock 26, snuffle, Patel, package, ISI, INR, INS, IRS, GRU, RUOP, GSS, NSP, SRI, Ronco, Armani, BOSS, Chobetsu, FBIS, BND, SISDE, FSB, BfV, IB, froglegs, JITEM, SADF, advise, TUSA, HoHoCon, SISMI, FIS, MSW, Spyderco, UOP, SSCI, NIMA, MOIS, SVR, SIN, advisors, SAP, OAU, PFS, Aladdin, chameleon man, Hutsul, CESID, Bess, rail gun, Peering, 17, 312, NB, CBM, CTP, Sardine, SBIRS, SGDN, ADIU, DEADBEEF, IDP, IDF, Halibut, SONANGOL, Flu, &, Loin, PGP 5.53, EG&G, AIEWS, AMW, WORM, MP5K-SD, 1071, WINGS, cdi, DynCorp, UXO, Ti, THAAD, package, chosen, PRIME, SURVIAC

***

 You’ll note, if you read through it, that the list itself is doing the job of overburdening the NSA’s staff. By including such commonly used words as flu, package, face, niche, package, credit card, fraud, basement, veggie (!), president, freedom (!), bank and Armani, they assure that there will be endless piles of communications that are completely innocuous that will have to be first read and examined for signs of terrorism. You’ll note too that there are some keywords that are even misspelled, meaning that the real words will be missed, for example: assassinate, priavacy(!), Secert Service and Hillal (is that supposed to be halal or Hillel I wonder?).

It’s also interesting to discover among the incriminating words that the NSA thinks might be used by potential “terrorists,” peculiar words like: freedom, veggie, sardine, Standford (sic), advisors, halibut, fish, Bubba the Love Sponge (really!), Playboy, dictionary and Zen (I’m sure there’s a great SNL skit in the works featuring a gang of Zen practitioners plotting their first terrorist action!).

Anyhow, have fun reading the list and selecting some of these choice keywords to sprinkling into your communications. Or you could just use them as a tag line to your emails, the way some people add inspirational sayings from the likes of Ben Franklin or Albert Einstein. Since the keyword list is so inclusive, you’re probably having your mail reviewed anyway, but why not make sure it is, just to keep the NSA occupied.

More articles by:

Dave Lindorff is a founding member of ThisCantBeHappening!, an online newspaper collective, and is a contributor to Hopeless: Barack Obama and the Politics of Illusion (AK Press).

CounterPunch Magazine

minimag-edit

bernie-the-sandernistas-cover-344x550

zen economics

June 28, 2017
Diana Johnstone
Macron’s Mission: Save the European Union From Itself
Jordon Kraemer
The Cultural Anxiety of the White Middle Class
Vijay Prashad
Modi and Trump: When the Titans of Hate Politics Meet
Jonathan Cook
Israel’s Efforts to Hide Palestinians From View No Longer Fools Young American Jews
Ron Jacobs
Gonna’ Have to Face It, You’re Addicted to War
Jim Lobe – Giulia McDonnell Nieto Del Rio
Is Trump Blundering Into the Next Middle East War?
Radical Washtenaw
David Ware, Killed By Police: a Vindication
John W. Whitehead
The Age of No Privacy: the Surveillance State Shifts into High Gear
Robert Mejia, Kay Beckermann and Curtis Sullivan
The Racial Politics of the Left’s Political Nostalgia
Tom H. Hastings
Courting Each Other
Winslow Myers
“A Decent Respect for the Opinions of Mankind”
Leonard Peltier
The Struggle is Never for Nothing
Jonathan Latham
Illegal GE Bacteria Detected in an Animal Feed Supplement
Deborah James
State of Play in the WTO: Toward the 11th Ministerial in Argentina
Binoy Kampmark
The European Commission, Google and Anti-Competition
Jesse Jackson
A Savage Health Care Bill
Jimmy Centeno
Cats and Meows in L.A
June 27, 2017
Jim Kavanagh
California Scheming: Democrats Betray Single-Payer Again
Jonathan Cook
Hersh’s New Syria Revelations Buried From View
Edward Hunt
Excessive and Avoidable Harm in Yemen
Howard Lisnoff
The Death of Democracy Both Here and Abroad and All Those Colorful Sneakers
Gary Leupp
Immanuel Kant on Electoral Interference
Kenneth Surin
Theresa May and the Tories are in Freefall
Slavoj Zizek
Get the Left
Robert Fisk
Saudi Arabia Wants to Reduce Qatar to a Vassal State
Ralph Nader
Driverless Cars: Hype, Hubris and Distractions
Rima Najjar
Palestinians Are Seeking Justice in Jerusalem – Not an Abusive Life-Long Mate
Norman Solomon
Is ‘Russiagate’ Collapsing as a Political Strategy?
Binoy Kampmark
In the Twitter Building: Tech Incubators and Altering Perceptions
Dean Baker
Uber’s Repudiation is the Moment for the U.S. to Finally Start Regulating the So-called Sharing Economy
Rob Seimetz
What I Saw From The Law
George Wuerthner
The Causes of Forest Fires: Climate vs. Logging
June 26, 2017
William Hawes – Jason Holland
Lies That Capitalists Tell Us
Chairman Brandon Sazue
Out of the Shadow of Custer: Zinke Proves He’s No “Champion” of Indian Country With his Grizzly Lies
Patrick Cockburn
Grenfell Tower: the Tragic Price of the Rolled-Back Stat
Joseph Mangano
Tritium: Toxic Tip of the Nuclear Iceberg
Ray McGovern
Hersh’s Big Scoop: Bad Intel Behind Trump’s Syria Attack
Roy Eidelson
Heart of Darkness: Observations on a Torture Notebook
Geoff Beckman
Why Democrats Lose: the Case of Jon Ossoff
Matthew Stevenson
Travels Around Trump’s America
David Macaray
Law Enforcement’s Dirty Little Secret
Colin Todhunter
Future Shock: Imagining India
Yoav Litvin
Animals at the Roger Waters Concert
Binoy Kampmark
Pride in San Francisco
Stansfield Smith
North Koreans in South Korea Face Imprisonment for Wanting to Return Home
FacebookTwitterGoogle+RedditEmail